First Page | Document Content | |
---|---|---|
![]() Date: 2014-07-21 01:39:39Computer security Malware Rogue software Spyware Computer virus Threat Vulnerability Privacy-invasive software Cyberwarfare Espionage Computer network security | Add to Reading List |
![]() | Comments on Spyware March 2004 WRITTEN COMMENTS OF DR. JOHN R. LEVINE It is my honor and privilege to submit these comments to the Subcommittee on Communications of the Senate Committee on Commerce, Science, and TransporDocID: 18PuX - View Document |
![]() | http://www.latimes.com/technology/la-na-spyware26nov26,1,267008DocID: 18grN - View Document |
![]() | Invasive Browser Sniffing and Countermeasures Markus Jakobsson Sid Stamm Indiana UniversityDocID: 13tCc - View Document |
![]() | Microsoft Word - Appendix JDocID: 132oy - View Document |
![]() | 9 Spyware: An Emerging Threat Brent A. Atchley and Allen R. Lee Spyware Overview The year is 2004, and the United States Government has enactedDocID: 121Pt - View Document |